An Approach to Detect and Correct Single Bit Data Error Using Reed_Muller Matrix
|
|
- Belinda Murphy
- 5 years ago
- Views:
Transcription
1 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May An Approach to Detect and Correct Single Bit Data Error Using Reed_Muller Matrix Monika Gope, Md. Ariful Islam Khandaker, Mehnuma Tabassum Omar Department of Computer Science and Engineering Khulna University of Engineering & Technology (KUET) Khulna 9203, Bangladesh. Abstract: Transferring data between two points is very crucial, also for some vital applications the precision of the transferred data is extremely important, however an error throughout the transmission of data is awfully familiar [1]. Error correcting codes are very valuable in transfer information over lengthy distances or through channels where errors might take place in the message. They have become more common as telecommunications have expanded and developed a use for codes that can auto-correct. Reed Muller codes are a family of linear error correcting codes used in communications [2].For bit error correction, the Reed-Muller code is one of the efficient algorithms, on the other hand, its high-computation prerequisite innate in the decoding process interdict its use in handy applications [3].This paper describes a new method to detect and correct a single bit in the data message using Reed Muller matrix. The aim is to provide error-free information through transmitting and receiving by detection and correction a single bit in a big data very efficiently. The design detects and corrects all single bit errors in a 16, 32, 64, 128 bit data, and used 4, 5, 6, 7 check bits respectively. In the proposed method, it is feasible to detect the precise place of single bit error and correct that using least. Index Terms- Error Correction and detection, Reed Muller, Coding, Single bit error, Check bit I I. INTRODUCTION n the present world, communication has got numerous applications such as telephonic conversations in which the messages are encoded into the communication channel and then decoding it at the receiver end [4]. Through data transmission, the arbitrary bit errors can be formed by ecological obstruction and material defects in the communication medium. Error coding is a technique of detecting and correcting these errors to make sure data is transferred unbroken from its source to its target. Computing in computer memory, magnetic and optical data storage technology, satellite, space and network communications, mobile networks, and almost any other form of digital data communication the error coding is used for fault tolerant. For communication error coding uses arithmetical formulas to encode data bits at the source into longer bit words and at the destination it decode the received bit words with the decoding method and determine the original massage. The earlier approach uses Error-Correcting Codes and latter uses Error-detecting Codes [5]. A method is basically worthless if it does not assure that the data received by one device are the same as the data transmitted by a different device. The main objective of this study is to device a coding scheme which is able to detect and correct such errors [6]. The rest of the paper is prepared as follows. In section 2, we briefly describe the highlights of the background of the coding scheme used in this paper. Section 3 presents our algorithm for matrix generation and generation, for all 16 bit,32 bit, 64 bit, 128 bit (and so on) data with check bit respectively 4, 5 6 ( and so on). In section 4, we present our algorithms for error correction and detection, validating the mathematical model used in Section 3 for mitigating soft error. In section 5, we will analysis our results and showed relative efficiency of the other ECC schemes. Section 6 concludes the paper. II. BACK GROUND OF THE CODING SCHEME The technique for error detection and correction algorithms presented in this paper had been implemented by Reed-Muller matrix, which is used mostly to convert between Fixed Polarity Reed-Muller form and Boolean functions [8, 9]. The process is mainly divided into two parts. The algorithm which is relatively simple involves transmitting data with multiple and decoding the associated when receiving or when reading data from random access memory (RAM) to detect the errors [6]. By combing the exact data bits in the original message using XOR operator each are generated. So at first we have generated the Reed-Muller matrix and then from the matrix we have to find out the check bit. The minimum number of check bits required to detect a single bit in the message is given by the following equation: D+C+1 2r (1) Where D is the number of data bits and C is the number of. Reed-Muller (RM) Codes are a family of linear errorcorrecting codes used in communications and are one of the oldest error correcting codes. On the other hand, error correcting codes play a significant function in computational complexity theory and are very functional in sending information over extensive distances in which errors might take place in the message [7]. This section describes a theory for encoding the message the transmitted data by using Reed-Muller basic matrix [10, 11]. In order to generate the Reed-Muller matrix for
2 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May all 16 bit, 32 bit, 64 and 128 bit data, the following Reed-Muller matrix is used: To generate we need to find out the corresponding 1 in the matrix and then XOR with them which will reflects the nature of the error. III. ALGORITHM FOR MATRIX AND CHECK BIT GENERATION To explain the concepts involved we developed a code that can detect and correct single bit error in 16, 32, 64, 128 bit words. We used equation (2) as a basic matrix for 16, 32, 64, 128 bit data. We used the equation for determining the data bit, (2) 2 C = D (3) Where C is the positive integer number which means how many times we need use the Kronecker operation [10, 11] over Reed-Muller matrix or how many is required to detect and correct error and D is data bit. Here as an example we will explain the 32 bit Reed-Muller matrix. To generate 32 bit Reed- Muller matrix we need Kronecker operator * for five times. Here, in this explanation C = 5 which means the data bit D = 32 as 2 5 = 32 for 5 times Kronecker operation over Reed-Muller matrix. (4) 3. If COUNT%R= =0 and COUNT!=0 Then: Set M: = M+1 4. If I % 2= = 0 then: Set P :=0 Else Set P: =1 5. Set L:=0 6. Repeat Steps 7 to 9 for J = 0,1,.Q-1 7. Set K:=0 8. Repeat while K < 2: a) Set X3[I][J+K] := X1[M][L] * X2[P][K] b) Set COUNT := COUNT + 1 [End Loop of Step 8] 9. Set L := L Return Algorithm (Reed_Muller): X1, X2 and X3 are two dimensional global declared matrixes and initially X1 is a basic 2x2 matrix. Finally X3 contains n x n output matrix. 1. [Initialization] Set S :=4, Q :=4 and R : =8 2. Repeat Steps 3 and 4 for I =1, 2,..n-1 3. Call Reed_Muller ( S, Q, R) 4. Set S := S * 2, Q := Q * 2 and R : = R * 2 5. Exit To generate the from equation (3), each row in equation (3) is operated on the data bits using the XOR and the AND operations to produce the necessary that are needed in the system to detect the error in the received message or the written message. The final results are given below, where + are XOR operation. The Algorithm we used for Reed-Muller matrix generation is given below: Procedure: Reed_Muller (S, Q, R) 1. [Initialization] Set COUNT := 0 and M :=0 2. Repeat Steps 3 to 9 for I = 0,1,.S-1 =D 0 C 1 =D 0 + D 1 C 2 =D 0 + D 2 C 3 =D 0 + D 1 + D 2 + D 3 C 4 =D 0 + D 4 C 5 =D 0 + D 1 + D 4 + D 5 C 6 =D 0 + D 2 + D 4 + D 6 C 7 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 C 8 =D 0 +D 8 C 9 =D 0 + D 1 +D 8 +D 9 C 10 =D 0 + D 2 + D 8 +D 10 C 11 =D 0 +D 1 +D 2 +D 3 + D 8 +D 9 +D 10 +D 11 C 12 =D 0 + D 4 + D8+ D 12 C 13 =D 0 +D 1 + D 4 +D 5 + D 8 +D 9 +D 12 +D 13 C 14 =D 0 +D 2 +D 4 +D 6 +D 8 +D 10 +D 12 +D 14 C 15 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 8 +D+D 10 +D 11 +D 12 +D 1 3 +D 14 +D 15 C 16 =D 0 + D 16 C 17 =D 0 + D 16 C 18 =D 0 + D 2 + D 16 + D 18 C 19 =D 0 + D 1 + D 2 + D 3 + D 16 + D 17 + D 18 +D 19 C 20 =D 0 + D 4 + D 16 + D 20 C 21 =D 0 + D 1 + D 4 + D 5 + D 16 + D 17 + D 20 + D 21
3 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May C 22 =D 0 + D 2 + D 4 + D 6 + D 16 + D 18 + D 20 + D 22 C 23 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 16 +D 17 +D 18 +D 19 +D 20 + D 21 +D 22 +D 23 C 24 =D 0 +D 8 +D 16 +D 24 C 25 =D 0 + D 1 +D 8 +D 9 + D 16 + D 17 + D 24 +D 25 C 26 =D 0 + D 2 + D 8 +D 10 + D 16 + D 18 +D 24 +D 26 C 27 =D 0 +D 1 +D 2 +D 3 +D 8 +D 9 +D 10 +D 11 +D 16 +D 17 +D 18 D 19 +D 24 +D 25 +D 26 +D 27 C 28 =D 0 + D 4 + D 8 + D 12 + D 16 + D 20 + D 24 + D 28 C 29 =D 0 +D 1 +D 4 +D 5 +D 8 +D 9 +D 12 +D 13 +D 16 +D 17 +D 20 +D 21 +D 24 +D 25 +D 28 +D 29 C 30 =D 0 +D 2 +D 4 +D 6 +D 8 +D 10 +D 12 +D 14 +D 16 +D 18 +D 20 +D 22 +D 2 4+ D 26 +D 28 +D 30 C 31 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 8 +D 9 +D 10 +D 11 +D 12 +D 13+ D 14 +D 15 +D 16 +D 17 +D 18 +D 19 +D 20 +D 21 +D 22 +D 23 +D 24 +D 25 +D 26 + D 27 +D 28 +D 29 +D 30 +D 31 Now we need to calculate the from the C0 to C31. As in this example we are working with 32 bit data, from equation (3), we find there are five. This five check bits are calculated from the following equation Q = 2 C-1 (5) Where Q means how many 1 s are in every check bit as the sum of 1 one column in the matrix and C = No. of Check bit, C. Those we have Q number of 1 in their column they are selected as check bit. So therefore, here C = 5 and Q = 16 which means from to C 31 who has 16 one, they should be selected as check bit. From the equation (3) and (5) we can derive the five check bit set which are as follows. C 15 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 +D 8 +D+ D 10 +D 11 +D 12 +D 13 +D 14 +D 15 C 23 =D 0 +D 1 +D 2 +D 3 +D 4 +D 5 +D 6 +D 7 + D 16 +D 17 +D 18 +D 19 +D 20 +D 21 +D 22 +D 23 C 27 =D 0 +D 1 +D 2 +D 3 +D 8 +D 9 +D 10 +D 11 +D 16 + D 17 + D 18 D 19 +D 24 +D 25 +D 26 +D 27 C 29 =D 0 +D 1 +D 4 +D 5 +D 8 +D 9 +D 12 +D 13 +D 16 + D 17 +D 20 +D 21 +D 24 +D 25 +D 28 +D 29 C 30 =D 0 +D 2 +D 4 +D 6 +D 8 +D 10 +D 12 +D 14 +D 16 + D 18 +D 20 +D 22 +D 24 +D 26 +D 28 +D 30 Now, we will denote C 15, C 23, C 27, C29 and C 30 respectively to, C 1, C 2, C 3 and C 4. From equation (3) for 64 data bit, the no of check bit is 6 as 64 = 2 6 and from the equation (5) the check bit set are as follows as each of the following contains 32 one in each column, C 31, C 47, C 55, C 59, C 61 and C 62. Table 1: The Corresponding for 32 data bit, D 0 to D 31 Data bits Generated check bit C 1 C 2 C 3 C 4 D 0 D 1 D 2 D 3 D 4 D 5 D 6 D 7 D 8 D 9 D 10 D 11 D 12 D 13 D 14 D 15 D 16 D 17 D 18 D 19 D 20 D 21 D 22 D 23 D 24 D 25 D 26 D 27 D 28 D 29 D 30 D 31 IV. ALGORITHM FOR ERROR CORRECTION AND DETECTION: Here we present the two algorithms for research of this paper for Error detection and correction for single data bit error. Algorithm EDC: Error Detection for data bit error () { 1. Calculation of the Syndrome Code, Syndrome Code = Received Check bit XOR Receiver generated Received Check bit. 2. IF Syndrome Code contains only zero, then there is no Error detected in Received Check bit. Do nothing or Print NO Error. 3. IF Syndrome Code contains multiple one but not all one, Then Error detected in one of the Received Data bit. Print Error in Data bit. 4. IF Syndrome Code contains all one, Then Error detected in the first Received Data bit. Print Error D 0 Data bit. }
4 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May Algorithm ECC: Error Correction for data bit error () { 1. IF Error detected in the first Received Data bit, then inverse the first Received Data bit. 2. IF Error detected in one of the Received Data bit, then the sum or weight of numerical value of the data bit is calculated by identified the zero-bits in the syndrome starting from the second bit left to right. These numerical values are zero and power of 2 as 2 N where N = 0, 1, 2, 3...to C, C = No. of check bit. 3. After identified the position of error in the Received Data bit from 2, the data bit position is inversed. } V. IMPLEMENTATION AND RESULT ANALYSIS: In paper [6], they proposed the error correction and detection code for 16 data bit with 6. Here, in our research, we showed the method which will work on 16, 32, 64 and 128 data bits and the required respectively 4, 5, 6 and 7 which will reduce the memory cost magnificently. Our unique contribution of the paper is the equation (3) and (4) which we proposed here to identified the. Table 2: Identifying the 2 C Data Bits, D Check bit, C C contains 2 C-1 s 1(one) in each Colum In our Error Correction Code Algorithms which we proposed here is very faster than [6], as we introduced power of 2 to identify the error position where one of the Received Data bits are error. From the algorithm we have simulated the error in data bit in our own simulator and find the result for 32 bit data, which is given in Table 3. Table 3 summarizes the process if one of the data bit become corrupted. Here the data massage = and check bit = We get the Syndrome by the following equation: Syndrome = Received + Recalculated/Receiver Generated Check bits (6) Where + means XOR operation and we got recalculated from equation (5). Table 3: Syndrome with recalculated and error bit position of the error data Data Received Recalculated Syndrome Error bit position of data D D D D =3 D D =5 D D = 17 D = 18 D = 19 D = 20 D =27 D = 28 D =29 D =30 D = 31 To find the error in one of the, the following Table 4 is used: Check bit Table 4: Syndrome for error check bit Received Recalculated Syndrome Error bit position of check bit C C C C VI. CONCLUSION In this paper we simply introduced a simple algorithm, which can be used to detect, and correct the errors in the transmitted data and check bit separately based on Reed-Muller matrix. The algorithm was tested on single bit error in our designed simulator and has found correct results for 16, 32, 64 and 128 data bits. In Future the algorithm can be extended to find more than single bit error.
5 International Journal of Scientific and Research Publications, Volume 5, Issue 5, May REFERENCES [1] Pramod S P, Rajagopal A, Akshay S Kotain, FPGA Implementation of Single Bit Error Correction using CRC, International Journal of Computer Applications ( ) Volume 52 No.10, August 2012 [2] [2] Nidhi Syal, Vaneet Chahal, Comparison of reed_muller and hamming codes for error detection and correction, ISP Journal of Electronics Engineering, Vol1, Issue 1, October 2011, (5-9) [3] Md. Sharif Uddin, Cheol Hong Kim, Jong-MyonKim, Accelerating Soft- Decision Reed-Muller Decoding Using a Graphics Processing Unit, Asiapacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology Vol.4, No.2, December (2014), pp [4] Varsha P. Patil, Prof. D. G. Chougule, Radhika.R.Naik, Viterbi Algorithm for error detection and correction, IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: , ISBN: , PP: [5] Notes on Error Detection and Correction, Version 2 CSE IIT, Kharagpur [6] Khalid Faraj, Design Error Detection and Correction System based on Reed_Muller Matrix for Memory Protection, International Journal of Computer Applications ( ) Volume 34 No.8, November 2011 [7] Othman O. Khalifa, Aisha-Huassan Abdullah, N. Suriyana, Saidah Zawanah and Shihab A. Hameed Reed-Muller Codec Simulation Performance, Journal of Computer Science 4 (10): , 2008 ISSN [8] Reed, I. S., Class of multiple error correcting codes and their decoding scheme, Institute of Radio Engineers Transaction on Information Theory, PGIT-4: pp , [9] Muller, D. E., Application of Boolean algebra to switching circuit design and to error detection, Institute of Radio Engineers Transaction on Electronic Computers, EC-3: pp. 6-12, September [10] Faraj, K., Almaini, A.E.A., Minimization of Dual Reed-Muller Forms using Dual Property WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS, Issue 1, Vol. 6, pp.9-15, January [11] Faraj, K., Almaini, A.E.A., Optimal Expression for Fixed Polarity Dual Reed-Muller Forms, WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS, Issue 3, Vol. 6, pp.9-15, March AUTHORS First Author Monika Gope, M.Sc (CSE ongoing), Khulna University of Engineering & Technology, gopenath14@yahoo.com. Second Author Md. Ariful Islam Khandaker, M.Sc(CSE ongoing), Khulna University of Engineering & Technology,aikhandaker@yahoo.com. Third Author Mehnuma Tabassum Omar, M.Sc(CSE ongoing), Khulna University of Engineering & Technology, misty2409@gmail.com.
Viterbi Algorithm for error detection and correction
IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil
More informationAchieving Reliable Digital Data Communication through Mathematical Algebraic Coding Techniques
International Journal of Pure and Applied Mathematical Sciences. ISSN 0972-9828 Volume 9, Number 2 (2016), pp. 183-190 Research India Publications http://www.ripublication.com Achieving Reliable Digital
More informationDesign and Implementation of Hamming Code on FPGA using Verilog
International Journal of Engineering and Advanced Technology (IJEAT) Design and Implementation of Hamming Code on FPGA using Verilog Ravi Hosamani, Ashwini S. Karne Abstract In mathematics, digital communication
More informationMajority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes
Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes P. Kalai Mani, V. Vishnu Prasath PG Student, Department of Applied Electronics, Sri Subramanya College of Engineering
More informationHamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics
Hamming Codes Hamming codes belong to the class of codes known as Linear Block Codes. We will discuss the generation of single error correction Hamming codes and give several mathematical descriptions
More informationImplementation of Fault Tolerant Parallel Filters Using ECC Technique
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 6, Issue 4, Ver. II (Jul. - Aug. 2016), PP 19-25 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iosrjournals.org Implementation of Fault Tolerant
More informationFault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes
Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors
More informationPerformance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER) and Field-Programmable Gate Array (FPGA)
IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.5, May 2016 21 Performance study and synthesis of new Error Correcting Codes RS, BCH and LDPC Using the Bit Error Rate (BER)
More informationJ. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India.
Design of Single Correction-Double -Triple -Tetra (Sec-Daed-Taed- Tetra Aed) Codes J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India. Dr. M. Manikandan Associate Professor,
More informationError Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL
Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Ch.Srujana M.Tech [EDT] srujanaxc@gmail.com SR Engineering College, Warangal. M.Sampath Reddy Assoc. Professor, Department
More informationError Correction Using Extended Orthogonal Latin Square Codes
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 9, Number 1 (2016), pp. 55-62 International Research Publication House http://www.irphouse.com Error Correction
More informationHDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES
HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)
More informationEfficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes
Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes 1 U.Rahila Begum, 2 V. Padmajothi 1 PG Student, 2 Assistant Professor 1 Department Of
More informationError Correction and Detection using Cyclic Redundancy Check
Error Correction and Detection using Cyclic Redundancy Check Dr. T. Logeswari Associate Professor, Dept of Computer Science, New Horizon College, Banglore, Karnataka, India ABSTRACT: In this paper Cyclic
More informationA New Error Correction Coding Approach
42 JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, VOL. 4, NO. 3, AUGUST 203 A New Error Correction Coding Approach Muhammad Sheikh Sadi Department of Computer Science & Engineering, Khulna University of
More informationError-Correcting Codes
Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The
More informationPerformance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis
More informationCS321: Computer Networks Error Detection and Correction
CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must
More informationOn-Line Error Detecting Constant Delay Adder
On-Line Error Detecting Constant Delay Adder Whitney J. Townsend and Jacob A. Abraham Computer Engineering Research Center The University of Texas at Austin whitney and jaa @cerc.utexas.edu Parag K. Lala
More informationAn HVD Based Error Detection and Correction Code in HDLC Protocol Used for Communication
An HVD Based Error Detection and Correction Code in HDLC Protocol Used for Communication Shubham Fadnavis, M. Tech. (Final Year) Department of Electronics & Communication, Acropolis Institute of Technology
More informationImplementation of Convolution Encoder and Viterbi Decoder Using Verilog
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 11, Number 1 (2018), pp. 13-21 International Research Publication House http://www.irphouse.com Implementation
More informationChapter 10 Error Detection and Correction 10.1
Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy
More informationError Resilience: A Distinct Approach for Comparative Analysis of Error Correcting Codes
I J C T A, 9(32), 2016, pp. 73-78 International Science Press ISSN: 0974-5572 Error Resilience: A Distinct Approach for Comparative Analysis of Error Correcting Codes P. Ratna Kamala* and R.V.S. Satyanarayana**
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationDesign and Implementation of Low Density Parity Check Codes
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V2 PP 21-25 www.iosrjen.org Design and Implementation of Low Density Parity Check Codes
More informationFPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes
FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes E. Jebamalar Leavline Assistant Professor, Department of ECE, Anna University, BIT Campus, Tiruchirappalli, India Email: jebilee@gmail.com
More informationDesign Single and Multiple Errors Correction Block Codes
Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)
More informationImplementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction
Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Vishal Badole 1, Amit Udawat 2 Department of Electronics and Communication Engg. 1, Acropolis
More informationImplementation of Hamming code using VLSI
International Journal of Engineering Trends and Technology- Volume4Issue2-23 Implementation of Hamming code using VLSI Nutan Shep, Mrs. P.H. Bhagat 2 Department of Electronics & Telecommunication Dr.B.A.M.U,Aurangabad
More informationEE 6900: FAULT-TOLERANT COMPUTING SYSTEMS
EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationAUDIO COMPRESSION USING WAVELET TRANSFORM
AUDIO COMPRESSION USING WAVELET TRANSFORM Swapnil T. Dumbre Department of electronics, Amrutvahini College of Engineering,Sangamner,India Sheetal S. Gundal Department of electronics, Amrutvahini College
More informationA High Performance CRC Checker for Ethernet Application
A High Performance CRC Checker for Ethernet Application Deepti Rani Mahankuda & M. Suresh Electronics and Communication Engineering Dept. National Institute of Technology, Berhampur, Odisha, India. E-mail:deepti.rani07@gmail.com
More informationCSN Telecommunications. 5: Error Coding. Data, Audio, Video and Images Prof Bill Buchanan
CSN874 Telecommunications 5: Error Coding Data, Audio, Video and Images http://asecuritysite.com/comms Prof Bill Buchanan CSN874 Telecommunications 5: Error Coding: Modulo-2 Data, Audio, Video and Images
More informationOptimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR)
Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) P. Vincy Priscilla 1, R. Padmavathi 2, S. Tamilselvan 3, Dr.S. Kanthamani 4 1,4 Department
More informationDESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY
DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY K.Maheshwari M.Tech VLSI, Aurora scientific technological and research academy, Bandlaguda, Hyderabad. k.sandeep kumar Asst.prof,
More informationPerformance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks
Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.
More informationError Detection And Correction
Announcements Please read Error Detection and Correction sent to you by your grader. Lab Assignment #2 deals with Hamming Code. Lab Assignment #2 is available now and will be due by 11:59 PM on March 22.
More informationImplementation of 16-Bit Hamming Code encoder and decoder for single bit error detector and corrector
Implementation of 16-Bit Hamming Code encoder and decoder for single bit error detector and corrector Dr.K.S.Srikanth, Dept of EEE, GMR IT, Gmr Nagar, Rajam A.R.V.Siva Krishna, Dept of Systems Design,
More information(Refer Slide Time 3:31)
Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions
More informationFault Tolerant Parallel Filters Based on ECC Codes
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 11, Number 7 (2018) pp. 597-605 Research India Publications http://www.ripublication.com Fault Tolerant Parallel Filters Based on
More informationApplication of Two-dimensional Periodic Cellular Automata in Image Processing
International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN
255 CORRECTIONS TO FAULT SECURE OF MAJORITY LOGIC DECODER AND DETECTOR FOR MEMORY APPLICATIONS Viji.D PG Scholar Embedded Systems Prist University, Thanjuvr - India Mr.T.Sathees Kumar AP/ECE Prist University,
More informationReliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure
Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Iswarya Gopal, Rajasekar.T, PG Scholar, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India Assistant
More informationDesign and Implementation of Low-Complexity Redundant Multiplier Architecture for Finite Field
Design and Implementation of Low-Complexity Redundant Multiplier Architecture for Finite Field Veerraju kaki Electronics and Communication Engineering, India Abstract- In the present work, a low-complexity
More informationVLSI Implementation of Daubechies Wavelet Filter for Image Compression
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 7, Issue 6, Ver. I (Nov.-Dec. 2017), PP 13-17 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iosrjournals.org VLSI Implementation of Daubechies
More informationFault Tolerant Parallel Filters Based On Bch Codes
RESEARCH ARTICLE OPEN ACCESS Fault Tolerant Parallel Filters Based On Bch Codes K.Mohana Krishna 1, Mrs.A.Maria Jossy 2 1 Student, M-TECH(VLSI Design) SRM UniversityChennai, India 2 Assistant Professor
More informationAn Integrated ECC and BISR Scheme for Error Correction in Memory
An Integrated ECC and BISR Scheme for Error Correction in Memory Shabana P B 1, Anu C Kunjachan 2, Swetha Krishnan 3 1 PG Student [VLSI], Dept. of ECE, Viswajyothy College Of Engineering & Technology,
More informationIJSER. Real Time Object Visual Inspection Based On Template Matching Using FPGA
International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 823 Real Time Object Visual Inspection Based On Template Matching Using FPGA GURURAJ.BANAKAR Electronics & Communications
More informationSoftware Testing. 1. Testing is the process of demonstrating that errors are not present.
What is Testing? Software Testing Many people understand many definitions of testing :. Testing is the process of demonstrating that errors are not present.. The purpose of testing is to show that a program
More informationArchive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker
Archive of past papers, solutions and homeworks for MATH 110, Discrete Mathematics, Fall 2012, Laurence Barker version: 15 January 2013 Source file: arch110fall12.tex page 2: Handout 1, Course specification.
More informationA Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
More informationComparative Analysis of DMC and PMC on FPGA
Comparative Analysis of DMC and PMC on FPGA Gnanajyothi R 1, Mr Ramana Reddy K V 2, Dr. Siva Yellampalli 3 1 Student, Mtech13, UTL VTU regional center, Bengaluru. 2 Assistant professor, UTL VTU regional
More informationImplementation of Double Precision Floating Point Multiplier Using Wallace Tree Multiplier
Implementation of Double Precision Floating Point Multiplier Using Wallace Tree Multiplier Y. Ramya sri 1, V B K L Aruna 2 P.G. Student, Department of Electronics Engineering, V.R Siddhartha Engineering
More informationComparative Performance Analysis of Block and Convolution Codes
Comparative Performance Analysis of Block and Convolution Codes Manika Pandey M.Tech scholar, ECE DIT University Dehradun Vimal Kant Pandey Assistant Professor/ECE DIT University Dehradun ABSTRACT Error
More informationA Low-Cost Correction Algorithm for Transient Data Errors
A Low-Cost Correction Algorithm for Transient Data Errors Aiguo Li, Bingrong Hong School of Computer Science and Technology Harbin Institute of Technology, Harbin 150001, China liaiguo@hit.edu.cn Introduction
More informationPRIYANKA DAYAL 11/1 Shastari Nagar, Nakodar Road, Jalandhar, India.
PRIYANKA DAYAL 11/1 Shastari Nagar, Nakodar Road, Jalandhar, India. CELL 9465623550 E-MAIL priyanka23dayal@gmail.com, priyanka_dayal@ymail.com PROFILE Self-motivated when succeed, Optimistic, able to work
More informationA Study on Transmission System for Realistic Media Effect Representation
Indian Journal of Science and Technology, Vol 8(S5), 28 32, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS5/61461 A Study on Transmission System for Realistic
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationPART III. Data Link Layer MGH T MGH C I 204
PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control
More informationImplementation of low power wireless sensor node with fault tolerance mechanism
Implementation of low power wireless sensor node with fault tolerance mechanism R.Divyasharon #1, Dr.D.Sridharan #2 #1 Department of ECE, Anna University CEG, Chennai-25, India #2 Department of ECE, Anna
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationModule 7 VIDEO CODING AND MOTION ESTIMATION
Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 20 Basic Building Blocks & Temporal Redundancy Instructional Objectives At the end of this lesson, the students should be able to: 1. Name at least five
More informationAN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES
AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT
More informationDepartment of Computer Science and Engineering Khulna University of Engineering & Technology Khulna , Bangladesh. Course Plan/Profile
Department of Computer Science and Engineering Khulna University of Engineering & Technology Khulna - 9203, Bangladesh Course Plan/Profile 1. Course No.: CSE 1201 Contact Hours:3/week 2. Course Title:
More informationFPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2)
FPGA IMPLEMENTATION OF A NEW BCH DECODER USED IN DIGITAL VIDEO BROADCASTING - SATELLITE - SECOND GENERATION (DVB-S2) 1* EL HABTI EL IDRISSI ANAS, 1, 2 EL GOURI RACHID, 3 AHMED LICHIOUI, 1 HLOU LAAMARI
More informationDLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR
DLD UNIT III Combinational Circuits (CC), Analysis procedure, Design Procedure, Combinational circuit for different code converters and other problems, Binary Adder- Subtractor, Decimal Adder, Binary Multiplier,
More informationDETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX
DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX ENDREDDY PRAVEENA 1 M.T.ech Scholar ( VLSID), Universal College Of Engineering & Technology, Guntur, A.P M. VENKATA SREERAJ 2 Associate
More informationEE 387 course information
EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming
More informationCh. 7 Error Detection and Correction
Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us
More informationImplementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
International Journal of Computer Trends and Technology (IJCTT) volume 5 number 5 Nov 2013 Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
More information/$ IEEE
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 56, NO. 1, JANUARY 2009 81 Bit-Level Extrinsic Information Exchange Method for Double-Binary Turbo Codes Ji-Hoon Kim, Student Member,
More informationProgramming in C++ Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Programming in C++ Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Programs with IO and Loop We will now discuss the module 2,
More informationELEC 691X/498X Broadcast Signal Transmission Winter 2018
ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this
More information2 Asst Prof, Kottam College of Engineering, Chinnatekur, Kurnool, AP-INDIA,
www.semargroups.org ISSN 2319-8885 Vol.02,Issue.06, July-2013, Pages:413-418 A H/W Efficient 64-Bit Parallel CRC for High Speed Data Transactions P.ABDUL RASOOL 1, N.MOHAN RAJU 2 1 Research Scholar, Kottam
More informationBinary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
More informationIt is well understood that the minimum number of check bits required for single bit error correction is specified by the relationship: D + P P
October 2012 Reference Design RD1025 Introduction This reference design implements an Error Correction Code (ECC) module for the LatticeEC and LatticeSC FPGA families that can be applied to increase memory
More information7 th Grade HONORS Year at a Glance
These skills will be incorporated into at least 75% of the test questions in reporting categories 1 5 and will be identified along with content standards. 7.13A identify and apply mathematics to everyday
More informationYork Public Schools Subject Area: Mathematics Course: 6 th Grade Math NUMBER OF DAYS TAUGHT DATE
6.1.1.d 6.EE.A.1 Represent large numbers using exponential notation (i.e.. 10x10x10x10x10) (Review PV chart first) Write evaluate numerical expressions involving whole number exponents 5 days August, Lesson
More informationCode Design as an Optimization Problem: from Mixed Integer Programming to an Improved High Performance Randomized GRASP like Algorithm
17 th European Symposium on Computer Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Code Design as an Optimization Problem: from Mixed Integer
More informationAlgorithm for a robust Message Authentication
Transaction on IoT and Cloud Computing 1(1) 13-19 2013 Algorithm for a robust Message Authentication Natasa Zivic University of Siegen, Hoelderlinstrasse 3, 57076 Siegen, Germany Abstract Message Authentication
More informationMobile Application with Optical Character Recognition Using Neural Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationA Combined Encryption Compression Scheme Using Chaotic Maps
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression
More informationCopyright Detection System for Videos Using TIRI-DCT Algorithm
Research Journal of Applied Sciences, Engineering and Technology 4(24): 5391-5396, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: March 18, 2012 Accepted: June 15, 2012 Published:
More information[Singh*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMAGE COMPRESSION WITH TILING USING HYBRID KEKRE AND HAAR WAVELET TRANSFORMS Er. Jagdeep Singh*, Er. Parminder Singh M.Tech student,
More informationDescribe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.
Quiz Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.) What are the two subspaces associated with a matrix? Describe
More informationExploiting Unused Spare Columns to Improve Memory ECC
2009 27th IEEE VLSI Test Symposium Exploiting Unused Spare Columns to Improve Memory ECC Rudrajit Datta and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer Engineering
More informationPerformance Optimization of HVD: An Error Detection and Correction Code
Abstract Research Journal of Engineering Sciences ISSN 2278 9472 Performance Optimization of HVD: An Error Detection and Correction Code Fadnavis Shubham Department of Electronics and Communication, Acropolis
More informationIMPLEMENTATION OF LOW-COMPLEXITY REDUNDANT MULTIPLIER ARCHITECTURE FOR FINITE FIELD
IMPLEMENTATION OF LOW-COMPLEXITY REDUNDANT MULTIPLIER ARCHITECTURE FOR FINITE FIELD JyothiLeonoreDake 1,Sudheer Kumar Terlapu 2 and K. Lakshmi Divya 3 1 M.Tech-VLSID,ECE Department, SVECW (Autonomous),Bhimavaram,
More informationA Hybrid Approach for Content Based Image Retrieval System
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 5 (Jul. - Aug. 2013), PP 56-61 A Hybrid Approach for Content Based Image Retrieval System Mrs. Madhavi
More informationDiversity Coloring for Distributed Storage in Mobile Networks
Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring
More informationICMIEE-PI Real-Time Monitoring and Controlling of Remote Electrical Device Using Microcontroller and Android Smart Phone via Internet
International Conference on Mechanical, Industrial and Energy Engineering 2014 26-27 December, 2014, Khulna, BANGLADESH ICMIEE-PI-140166 Real-Time Monitoring and Controlling of Remote Electrical Device
More informationMobile Positioning System Based on the Wireless Sensor Network in Buildings
Communications and Network, 2009, 1, 96-100 doi:10.4236/cn.2009.12015 Published Online November 2009 (http://www.scirp.org/journal/cn). Mobile Positioning System Based on the Wireless Sensor Network in
More informationDefect Tolerance in VLSI Circuits
Defect Tolerance in VLSI Circuits Prof. Naga Kandasamy We will consider the following redundancy techniques to tolerate defects in VLSI circuits. Duplication with complementary logic (physical redundancy).
More informationSoftware Implementation of Break-Up Algorithm for Logic Minimization
vol. 2, no. 6. 2, pp. 141-145, 2017 DOI: https://doi.org/10.24999/ijoaem/02060034 Software Implementation of Break-Up Algorithm for Logic Minimization Koustuvmoni Bharadwaj and Sahadev Roy Abstract In
More informationCDS Computing for Scientists. Final Exam Review. Final Exam on December 17, 2013
CDS 130-001 Computing for Scientists Final Exam Review Final Exam on December 17, 2013 1. Review Sheet 2. Sample Final Exam CDS 130-001 Computing for Scientists Final Exam - Review Sheet The following
More informationVOICE CONTROLLED WHEEL CHAIR USING ARDUINO
VOICE CONTROLLED WHEEL CHAIR USING ARDUINO Kharka Bahadur Rai 1, Jeetendra Thakur 2, Nirmal Rai 3 1,2 Student, 3 Asst. Professor, Department of Electronics and Communication Engineering, Sikkim Manipal
More informationDesign of Flash Controller for Single Level Cell NAND Flash Memory
Design of Flash Controller for Single Level Cell NAND Flash Memory Ashwin Bijoor 1, Sudharshana 2 P.G Student, Department of Electronics and Communication, NMAMIT, Nitte, Karnataka, India 1 Assistant Professor,
More information